{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:20:43Z","timestamp":1773246043627,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-14-CE28-0022"],"award-info":[{"award-number":["ANR-14-CE28-0022"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]},{"name":"R\u00e9on Nouvelle-Aquitaine","award":["2017-1R50108-00013407"],"award-info":[{"award-number":["2017-1R50108-00013407"]}]},{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"crossref","award":["ANR-16-CHR2-0004"],"award-info":[{"award-number":["ANR-16-CHR2-0004"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"crossref","award":["ANR-18-LCV3- 0008"],"award-info":[{"award-number":["ANR-18-LCV3- 0008"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17021-1","type":"journal-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T11:03:21Z","timestamp":1698404601000},"page":"47477-47502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Printed and scanned document authentication using robust layout descriptor matching"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5515-7828","authenticated-orcid":false,"given":"Petra","family":"Gomez-Kr\u00e4mer","sequence":"first","affiliation":[]},{"given":"Kais","family":"Rouis","sequence":"additional","affiliation":[]},{"given":"Azise Oumar","family":"Diallo","sequence":"additional","affiliation":[]},{"given":"Micka\u00ebl","family":"Coustaty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"17021_CR1","doi-asserted-by":"crossref","unstructured":"Eskenazi S, Gomez-Kr\u00e4mer P, Ogier J-M (2015) The Delaunay document layout descriptor. In: ACM Symposium on Document Engineering (DocEng), pp 167\u2013175","DOI":"10.1145\/2682571.2797059"},{"key":"17021_CR2","unstructured":"ANTS (2020) Sp\u00e9cifications techniques des codes \u00e0 barres 2D-Doc. Technical report, ANTS. https:\/\/ants.gouv.fr\/Les-solutions\/2D-Doc"},{"issue":"1","key":"17021_CR3","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TIFS.2009.2038742","volume":"5","author":"G Zhu","year":"2010","unstructured":"Zhu G, Huang J, Kwong S, Yang J (2010) Fragility analysis of adaptive quantization based image hashing. IEEE Trans Inf Forensics Secur 5(1):133\u2013147","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"17021_CR4","first-page":"280","volume":"26","author":"Y Lei","year":"2011","unstructured":"Lei Y, Wang Y, Huang J (2011) Robust image hash in Radon transform domain for authentication. Signal Process: Image Commun 26(6):280\u2013288","journal-title":"Signal Process: Image Commun"},{"key":"17021_CR5","doi-asserted-by":"crossref","unstructured":"Rouis K, Gomez-Kr\u00e4mer P, Coustaty M (2020) Local geometry analysis for image tampering detection. In: International Conference on Image Processing (ICIP), pp 2551\u20132555","DOI":"10.1109\/ICIP40778.2020.9190762"},{"key":"17021_CR6","first-page":"115713","volume":"81","author":"L Du","year":"2020","unstructured":"Du L, Ho ATS, Cong R (2020) Perceptual hashing for image authentication: A survey. Signal Process: Image Commun 81:115713","journal-title":"Signal Process: Image Commun"},{"key":"17021_CR7","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/TIFS.2022.3161149","volume":"17","author":"X Li","year":"2022","unstructured":"Li X, Qin C, Wang Z, Qian Z, Zhang X (2022) Unified performance evaluation method for perceptual image hashing. IEEE Trans Inf Forensics Secur 17:1404\u20131419","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"17021_CR8","volume-title":"Secure imprint generated for paper documents (SIGNED)","author":"A Malvido Garc\u00eda","year":"2013","unstructured":"Malvido Garc\u00eda A (2013) Secure imprint generated for paper documents (SIGNED). Technical report, Bit Oceans"},{"key":"17021_CR9","unstructured":"Shimizu DM, Kim HY (2007) Perceptual hashing for hardcopy document authentication using morphological segmentation. In: International Symposium on Mathematical Morphology, pp 77\u201378"},{"key":"17021_CR10","doi-asserted-by":"crossref","unstructured":"Vill\u00e1n R, Voloshynovskiy S, Koval O, Deguillaume F, Pun T (2007) Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p 65051","DOI":"10.1117\/12.704097"},{"key":"17021_CR11","doi-asserted-by":"crossref","unstructured":"Eskenazi S, Gomez-Kr\u00e4mer P, Ogier J-M (2017) A study of the factors influencing OCR stability for hybrid security. In: International Conference on Document Analysis and Recognition (ICDAR), vol. 09, pp 3\u20138. IEEE","DOI":"10.1109\/ICDAR.2017.388"},{"issue":"8","key":"17021_CR12","first-page":"1","volume":"3","author":"L Tan","year":"2011","unstructured":"Tan L, Sun X, Zhou Z, Zhang W (2011) Perceptual text image hashing based on shape recognition. Adv Inf Sci Serv Sci 3(8):1\u20137","journal-title":"Adv Inf Sci Serv Sci"},{"key":"17021_CR13","doi-asserted-by":"crossref","unstructured":"Al-Ghadi MQ, Azzouza T, Gomez-Kr\u00e4mer P, Burie J, Coustaty M (2021) Robust hashing for character authentication and retrieval using deep features and iterative quantization. In: Document Analysis and Recognition, ICDAR 2021 Workshops, Part I, vol. 12916, pp 466\u2013481. Springer,","DOI":"10.1007\/978-3-030-86198-8_33"},{"key":"17021_CR14","unstructured":"Smoac\u0103 A (2011) ID photograph hashing: a global approach. PhD thesis, University Jean Monnet, Saint-Etienne, France and Politehnica University of Bucharest, Romania"},{"key":"17021_CR15","doi-asserted-by":"crossref","unstructured":"Eskenazi S, Bodin B, Gomez-Kr\u00e4mer P, Ogier J-M (2017) A perceptual image hashing algorithm for hybrid document security. In: International Conference on Document Analysis and Recognition (ICDAR), pp 741\u2013746. IEEE,","DOI":"10.1109\/ICDAR.2017.126"},{"key":"17021_CR16","unstructured":"Eskenazi S (2016) On the stability of document analysis algorithms: application to hybrid document hashing technologies. PhD thesis, La Rochelle University"},{"key":"17021_CR17","doi-asserted-by":"crossref","unstructured":"Eskenazi S, Gomez-Kr\u00e4mer P, Ogier J-M (2016) Evaluation of the stability of four document segmentation algorithms. In: International Workshop on Document Analysis Systems (DAS), pp 1\u20136","DOI":"10.1109\/DAS.2016.25"},{"key":"17021_CR18","unstructured":"Ahmed S, Davila K, Setlur S, Govindaraju V (2020) Equation attention relationship network (EARN): A geometric deep metric framework for learning similar math expression embedding. In: International Conference on Pattern Recognition (ICPR), pp 6282\u20136289"},{"key":"17021_CR19","unstructured":"Shin CK, Doermann DS (2006) Document image retrieval based on layout structural similarity. In: International Conference on Image Processing, Computer Vision, & Pattern Recognition, pp 606\u2013612"},{"issue":"1","key":"17021_CR20","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/08839519408945432","volume":"8","author":"F Esposito","year":"1994","unstructured":"Esposito F, Malerba D, Semeraro G (1994) Multistrategy learning for document recognition. Appl Artif Intell Int J 8(1):33\u201384","journal-title":"Appl Artif Intell Int J"},{"issue":"2\u20133","key":"17021_CR21","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10032-005-0148-5","volume":"8","author":"B Co\u00fcasnon","year":"2006","unstructured":"Co\u00fcasnon B (2006) DMOS, a generic document recognition method: application to table structure analysis in a general and in a specific way. Int J Doc Anal Recognit 8(2\u20133):111\u2013122","journal-title":"Int J Doc Anal Recognit"},{"key":"17021_CR22","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1023\/A:1009910911387","volume":"2","author":"J Hu","year":"2000","unstructured":"Hu J, Kashi RS, Wilfong GT (2000) Comparison and classification of documents based on layout similarity. Inf Retr 2:227\u2013243","journal-title":"Inf Retr"},{"key":"17021_CR23","doi-asserted-by":"crossref","unstructured":"van Beusekom J, Keysers D, Shafait F, Breuel TM (2006) Distance measures for layout-based document image retrieval. In: Second International Workshop on Document Image Analysis for Libraries (DIAL), pp 232\u2013242","DOI":"10.1109\/DIAL.2006.16"},{"key":"17021_CR24","doi-asserted-by":"crossref","unstructured":"Shafait F, van Beusekom J, Keysers D, Breuel TM (2008) Structural mixtures for statistical layout analysis. In: International Workshop on Document Analysis Systems (DAS), pp 415\u2013422","DOI":"10.1109\/DAS.2008.61"},{"key":"17021_CR25","doi-asserted-by":"crossref","unstructured":"Pirlo G, Chimienti M, Dassisti M, Impedovo D, Galiano A (2013) Layout-based document-retrieval system by radon transform using dynamic time warping. In: International Conference Image Analysis and Processing (ICIAP). Lecture Notes in Computer Science, vol. 8156, pp 61\u201370","DOI":"10.1007\/978-3-642-41181-6_7"},{"key":"17021_CR26","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.patrec.2013.10.030","volume":"43","author":"J Kumar","year":"2014","unstructured":"Kumar J, Ye P, Doermann D (2014) Structural similarity for document image classification and retrieval. Pattern Recogn Lett 43:119\u2013126","journal-title":"Pattern Recogn Lett"},{"key":"17021_CR27","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/ICPR.2002.1047980","volume":"3","author":"J Liang","year":"2002","unstructured":"Liang J, Doermann D, Ma M, Guo JK (2002) Page classification through logical labelling. Int Conf Pattern Recogn (ICPR) 3:477\u2013480","journal-title":"Int Conf Pattern Recogn (ICPR)"},{"key":"17021_CR28","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.patcog.2017.07.030","volume":"72","author":"R Chaieb","year":"2017","unstructured":"Chaieb R, Kalti K, Luqman MM, Coustaty M, Ogier J-M, Essoukri Ben Amara N (2017) Fuzzy generalized median graphs computation: application to content-based document retrieval. Pattern Recogn 72:266\u2013284","journal-title":"Pattern Recogn"},{"key":"17021_CR29","doi-asserted-by":"crossref","unstructured":"Cesarini F, Marinai S, Soda G (2002) Retrieval by layout similarity of documents represented with MXY trees. In: Document Analysis Systems (DAS). Lecture Notes in Computer Science, vol. 2423, pp 353\u2013364","DOI":"10.1007\/3-540-45869-7_40"},{"key":"17021_CR30","doi-asserted-by":"crossref","unstructured":"Gordo A, Valveny E (2009) A rotation invariant page layout descriptor for document classification and retrieval. In: International Conference on Document Analysis and Recognition (ICDAR), pp 481\u2013485","DOI":"10.1109\/ICDAR.2009.110"},{"key":"17021_CR31","doi-asserted-by":"crossref","unstructured":"Nakai T, Kise K, Iwamura M (2006) Use of affine invariants in locally likely arrangement hashing for camera-based document image retrieval. In: International Workshop on Document Analysis Systems (DAS), pp 541\u2013552","DOI":"10.1007\/11669487_48"},{"key":"17021_CR32","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.patrec.2018.07.009","volume":"112","author":"QB Dang","year":"2018","unstructured":"Dang QB, Coustaty M, Luqman MM, Ogier J-M, Tran CD (2018) New spatial-organization-based scale and rotation invariant features for heterogeneous-content camera-based document image retrieval. Pattern Recogn Lett 112:153\u2013160","journal-title":"Pattern Recogn Lett"},{"key":"17021_CR33","doi-asserted-by":"crossref","unstructured":"Dang QB, Rusi\u00f1ol M, Coustaty M, Luqman MM, Tran C, Ogier J-M (2016) Delaunay triangulation-based features for camera-based document image retrieval system. In: International Workshop on Document Analysis Systems (DAS), pp 1\u20136","DOI":"10.1109\/DAS.2016.66"},{"issue":"5","key":"17021_CR34","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/34.6778","volume":"10","author":"S Umeyama","year":"1988","unstructured":"Umeyama S (1988) An eigendecomposition approach to weighted graph matching problems. IEEE Trans Pattern Anal Mach Intell 10(5):695\u2013703","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"10","key":"17021_CR35","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/34.954602","volume":"23","author":"B Luo","year":"2001","unstructured":"Luo B, Hancock ER (2001) Structural graph matching using the em algorithm and singular value decomposition. IEEE Trans Pattern Anal Mach Intell 23(10):1120\u20131136","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"17021_CR36","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/TCYB.2015.2402751","volume":"46","author":"J Tang","year":"2016","unstructured":"Tang J, Shao L, Li X, Lu K (2016) A local structural descriptor for image matching via normalized graph laplacian embedding. IEEE Trans Cybern 46(2):410\u2013420","journal-title":"IEEE Trans Cybern"},{"key":"17021_CR37","doi-asserted-by":"crossref","unstructured":"Zanfir A, Sminchisescu C (2018) Deep learning of graph matching. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 2684\u20132693","DOI":"10.1109\/CVPR.2018.00284"},{"key":"17021_CR38","doi-asserted-by":"crossref","unstructured":"Sarlin P-E, DeTone D, Malisiewicz T, Rabinovich A (2020) Superglue: Learning feature matching with graph neural networks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 4937\u20134946","DOI":"10.1109\/CVPR42600.2020.00499"},{"key":"17021_CR39","doi-asserted-by":"crossref","unstructured":"Chen K, Yin F, Liu C-L (2013) Hybrid page segmentation with efficient whitespace rectangles extraction and grouping. In: International Conference on Document Analysis and Recognition (ICDAR), pp 958\u2013962","DOI":"10.1109\/ICDAR.2013.194"},{"issue":"8","key":"17021_CR40","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/34.946985","volume":"23","author":"Y Deng","year":"2001","unstructured":"Deng Y, Manjunath B (2001) Unsupervised segmentation of color-texture regions in images and video. IEEE Trans Pattern Anal Mach Intell 23(8):800\u2013810","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"17021_CR41","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1006\/cviu.1998.0684","volume":"70","author":"K Kise","year":"1998","unstructured":"Kise K, Sato A, Iwata M (1998) Segmentation of page images using the area Voronoi diagram. Comput Vis Image Underst 70(3):370\u2013382","journal-title":"Comput Vis Image Underst"},{"key":"17021_CR42","doi-asserted-by":"crossref","unstructured":"Antonacopoulos A, Bridson D, Papadopoulos C, Pletschacher S (2009) A realistic dataset for performance evaluation of document layout analysis. In: International Conference on Document Analysis and Recognition (ICDAR), pp 296\u2013300","DOI":"10.1109\/ICDAR.2009.271"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17021-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17021-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17021-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T11:22:38Z","timestamp":1715080958000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17021-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":42,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17021"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17021-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"1 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}